Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

If a process, procedure, or solution you need to implement is not compliant with current security policies or standards you will need to apply for a temporary exception with ITS Information Security.

How to apply for a Security Exception

...

  • All Security Exceptions — if approved — are only valid for up to 6 months.

  • Once the specified expiration date has passed, you are required to immediately cease implementation of the process, procedure, or solution referenced in your request.

  • If approved, you must abide by any additional conditions imposed by Information Security that were communicated to you in order to retain the active status for an approved exception.

  • ITS or Information Security may revoke the active status for an approved Security Exception at any time.

  • After the expiration date, a Security Exception request cannot be reinstated. A new Security Exception Request form must be submitted again.

Security Exception approval process

Once you submit the Security Exception Request form, a series of approvals are required before the exception is considered active.

These are the following people or groups, in order, that will be reviewing and approving or denying the request.

  1. Your manager

  2. Director of Risk & Cybersecurity

  3. CIO of Information Technology Services (ITS)

If approved, you will receive a notification via email that your request was approved.

Info

Need additional help? Submit a ticket in our new portal here: IT Service Desk Help Center

...